Cyber Security News

New C++-Based IIS Malware Mimics cmd.exe to Evade Detection

A recent discovery by Palo Alto Networks’ Unit 42 has shed light on sophisticated malware targeting Internet Information Services (IIS) servers.

This malware, developed in C++/CLI, a rare choice for malware authors, has been designed to mimic the behavior of cmd.exe to evade detection.

The malware operates as a passive backdoor, integrating itself into the IIS server by registering for HTTP response events.

It filters incoming HTTP requests for specific headers, which are used to execute commands.

The commands and data are encrypted using AES and then Base64-encoded, adding a layer of complexity to its operations.

Technical Analysis

The malware has two versions, both of which were uploaded to VirusTotal from Thailand.

The newer version, compiled on May 9, 2023, employs a custom cmd.exe wrapper tool to execute commands, reducing the visibility of its activities by avoiding direct cmd.exe invocation from the IIS process.

IIS backdoor event handler as shown by dnSpyEx.

This wrapper application is embedded within the malware and communicates via a named pipe, allowing it to redirect command-line commands from the command and control (C2) server and return results.

The malware supports a range of commands, including file management, process execution, and system information retrieval.

According to the Report, it also patches AMSI and ETW routines to evade detection by security software.

The use of C++/CLI for this malware is notable due to its rarity in the malware landscape.

This choice likely stems from the language’s ability to combine managed and unmanaged code, making analysis more challenging.

The malware’s sophistication and targeted nature suggest it may have been used in specific attacks, although attribution to a known threat actor remains elusive.

Detection and Protection

Palo Alto Networks’ Advanced WildFire and Cortex XDR/XSIAM solutions offer enhanced protection against this malware by leveraging memory analysis and behavioral threat protection.

These tools can identify and block both known and unknown malware, providing a robust defense mechanism against such sophisticated threats.

As the cybersecurity landscape continues to evolve, staying informed about emerging threats and employing advanced security solutions is crucial for organizations seeking to protect their infrastructure.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Hackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks

In recent months, a sophisticated social engineering technique known as ClickFix has gained significant traction…

7 minutes ago

Supply Chain Attack Targets 23,000 GitHub Repositories

A critical security incident has been uncovered involving the popular GitHub Action tj-actions/changed-files, which is…

9 minutes ago

Beware! Malware Hidden in Free Word-to-PDF Converters

The FBI has issued a warning about a growing threat involving free file conversion tools,…

12 minutes ago

MassJacker Clipper Malware Targets Users Installing Pirated Software

A recent investigation has uncovered previously unknown cryptojacking malware, dubbed MassJacker, which primarily targets users…

12 minutes ago

SocGholish Exploits Compromised Websites to Deliver RansomHub Ransomware

SocGholish, a sophisticated malware-as-a-service (MaaS) framework, has been identified as a key enabler in the…

14 minutes ago

New Steganographic Malware Hides in JPG Files to Deploy Multiple Password Stealers

A recent cybersecurity threat has emerged in the form of a steganographic campaign that uses…

16 minutes ago